1. The Handbook of Security,2006
2. Iridology: A critical review;Berggren;Acta Ophthalmol. (Copenh),1985
3. Real-time tracking of multiple people using stereo cameras;Beymer,1999
4. Higher-level vision;Biederman,1990
5. Brooks, D.J., 2010. Assessing vulnerabilities of biometric readers using an applied defeat evaluation methodology. Paper presented at the Proceedings of the 3rd Australian Security and Intelligence Conference, Perth, WA.